PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: confidence

INFORMATION TECHNOLOGY SECURITY POLICY

INFORMATION TECHNOLOGY SECURITY POLICY Office of the Chief INFORMATION Officer (OCIO) ITA POLICY : P-002 Revision Date: 12/12/2019 Effective Date: 05/22/2019 2 Revision History Date Version Description of Changes Author 02/15/2019 .1 Creation of INFORMATION TECHNOLOGY Management Primary POLICY Lois Mockabee 5/22/2019 .2 Managerial Edits Joe Ramsey 6/28/2019 .3 Included DOC ITSBP document for reference Tim McGrail 6/28/2019 Baseline document for signature Tim McGrail 8/24/2019 Updated POLICY item B. Changed month to week Tim McGrail 11/06/2019 Added zero-day vulnerability language Tim McGrail 12/11/2019 Reformat for Appendixes Tripp Duke 12/12/2019 Final for signature Tim McGrail ITA POLICY : P-002 Revision Date: 12/12/2019 Effective Date: 05/22/2019 3 Contents Revision History.

security posture of ITA computing devices. All computing devices (desktop computer, laptop or phone) shall be connected to the ITA network within 24 hours of notification by TSI of a 0-day vulnerability and shall remain connected for a period at least 24 hours. 5. RELATED DOCUMENTS . TSI Guidance . 1.

Tags:

  Computing, Security

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of INFORMATION TECHNOLOGY SECURITY POLICY

Related search queries